The real cost of health cloud attacks

The healthcare sector is twice as likely to face data breach consequences as any other industry surveyed.

Netwrix has published additional findings for the healthcare sector from its global 2022 Cloud Security Report.

 

61% of respondents in the healthcare industry suffered a cyberattack on their cloud infrastructure within the last 12 months, compared to 53% for other verticals. Phishing was the most common type of attack reported.

 

“The healthcare sector is a lucrative target for attackers because the chances of success are higher. The first two years of the pandemic exhausted the industry. With patient health being the main priority for these organisations, IT security resources are often too stretched and are focused on maintaining only the most necessary functions,” comments Dirk Schrader, VP of Security Research at Netwrix. “Plus, the high value of data gives cyber criminals better opportunities at financial gain: they can either sell stolen sensitive medical information on the dark web or extort a ransom for ‘unfreezing’ the medical systems used to keep patients alive.”

 

An attack in the healthcare sector is more likely to result in financial consequences. 32% of respondents from other industries report that an attack had no impact on their business, while only 14% of healthcare organisations say the same. Unplanned expenses to cover security gaps and compliance fines are the most common types of damage that the healthcare sector faces due to a cyberattack.

 

“Healthcare organisations plan to increase the share of their workload in the cloud from 38% to 54% by the end of 2023. Fast cloud adoption should be accompanied by relevant security measures and special attention to internet-of-things (IoT) devices and systems; for example, compromise of respirators or IV infusion devices can lead to physical harm to patients,” adds Schrader. “Network segmentation will help prevent one compromised device from impacting the entire system. IT teams must also strictly limit who — humans and machines — can access what data and systems according to the least-privilege principle, and regularly review and right-size those access rights.”

Aruba has joined the International Data Spaces Association (IDSA) to support the development of...
NinjaOne Backup is gaining traction for its integrated IT management approach, offering backup...
Ping Identity has received the 2026 Google Cloud Security Partner of the Year Award for Identity &...
CrowdStrike has expanded its Cloud Detection and Response capabilities with integration into Google...
Bitdefender has launched GravityZone Extended Email Security, combining email and endpoint...
Extreme Networks reports growing adoption of Platform ONE, with customers using its AI-driven model...
Tenable Research has identified a vulnerability in a Microsoft GitHub repository that could affect...
Commvault has released details of AI capabilities focused on managing data, agents, and recovery...